View Issue Details

IDProjectCategoryView StatusLast Update
0006766SymmetricDS ProImprovementpublic2025-03-17 16:56
Reporteremiller Assigned Toemiller  
Prioritynormal 
Status resolvedResolutionfixed 
Product Version3.15.0 
Target Version3.15.15Fixed in Version3.15.15 
Summary0006766: Sign SAML requests with SHA-256 instead of SHA-1
DescriptionThere's an open issue with the SAML library that SymmetricDS uses where it defaults to signing requests with SHA-1, which is an obsolete signature algorithm:

https://github.com/SAML-Toolkits/java-saml/issues/415

Some identity providers require a newer signature algorithm and will return a response of "urn:oasis:names:tc:SAML:2.0:status:Responder" if the request is signed with SHA-1, causing the SAML login to fail. Change the signature algorithm to SHA-256, which is not obsolete.
Tagssecurity

Relationships

related to 0006767 resolvedemiller Sign SAML requests with SHA-256 instead of SHA-1 

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2025-03-17 16:41 emiller New Issue
2025-03-17 16:41 emiller Status new => assigned
2025-03-17 16:41 emiller Assigned To => emiller
2025-03-17 16:41 emiller Tag Attached: security
2025-03-17 16:42 emiller Issue cloned: 0006767
2025-03-17 16:42 emiller Relationship added related to 0006767
2025-03-17 16:56 emiller Status assigned => resolved
2025-03-17 16:56 emiller Resolution open => fixed
2025-03-17 16:56 emiller Fixed in Version => 3.15.15